LinkedIn Tracking

NSI Encrypted Mobile Communication Devices

Authorised Australian Reseller

Detection of IMSI Catchers – Baseband Firewall and Attack Detection

NSI Encrypted Mobile Communication Devices offer voice and messaging encryption like no other. The devices are a highly secure, tamper resistant, mobile phone that come with full source code available for independent review. Finally, you can perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust with your confidential data and telephone calls.

The latest NSI Encrypted Mobile Communication Devices offer Unique protection against over-the-air attacks with constant monitoring of baseband processor activity by detecting Signalling System 7 (SS7) paging requests and Silent SMS Tracking attempts. The NSI Encrypted Mobile Communication Devices can also quickly and easily advise you of any interception from rogue base stations/cell towers.

Baseband Firewall Features:
  • Detection of IMSI Catchers – IMSI Catchers, or Stinger Towers, are fake base stations or cell tower which are used to get mobile phones that are within range to register to it using the SS7 protocol. This is a major threat in that conversations may be read and listened to. This allows the attacker to force down the network from either 4G or 3G down to 2G, deactivate encryption, jamming and other active cellular interference.
  • Baseband Firewall – Unique protection against over-the-air attacks with constant baseband activity monitoring.
  • Baseband Attack Detection – Advanced heuristics allow the detection of suspicious activities and the initiation of countermeasures.

Contact us today to enquire about NSI Encrypted Communication Devices which include mobile phones, desk phones, servers, and satellite phones.

Equipment for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently, even in comparatively small business conflicts. So using encryption to protect your privacy is a wise choice. If you conduct business that is of high sensitivity; in conflict zones or a high security area, using secure communications such as an encrypted phone is a must.

By combining renowned end-to-end voice and message encryption with a highly sophisticated approach towards mobile device protection, the NSI Encrypted Mobile Communication Devices offer a defence-grade mobile phone security solution with true 360° mobile device security.

The NSI Encrypted Mobile Communication Device has the following features:
  • Tamper-Resistant, Tamper-Evident Hardware Design – Dedicated hardware security modules, shield removal detection circuitry, security certified FIPS 140-2.
  • Encrypted Storage System – Contacts, messages, and notes with smart folders protects data at rest against unauthorised access.
  • Secure Contacts and Call History – Your whole contact list and call history are kept secure. Protecting ‘when you called’ someone is as important as ‘who you called’.
  • Voice Encryption – Secure end-to-end encrypted voice over IP calls on any network – GSM, 3G, 4G, WLAN.
  • Secure Messaging – Based on the same strong encryption algorithms used for voice encryption.
  • Device Protection – Control access to the network, data, and sensors like the camera and microphone via the Permission Enforcement Module.
  • Verifiable Source Code – The only secure phone on the market with source code available for independent security assessments.
  • Android OS – Built from source code with granular security management, and security optimised components and communication stacks.